Offloading Security Applications into the Network

Size: px
Start display at page:

Download "Offloading Security Applications into the Network"

Transcription

1 echallenges e-2014 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2014 ISBN: Offloading Security Applications into the Network Antonio LIOY 1, Antonio PASTOR 2, Fulvio RISSO 1, Roberto SASSU 1, Adrian L. SHAW 3 1 Politecnico di Torino DAUIN, c. Duca degli Abruzzi 24, Torino, 10129, Italy antonio.lioy@polito.it, fulvio.risso@polito.it, roberto.sassu@polito.it 2 Telefónica I +D, c. Don Ramon de la Cruz 82, Madrid, 28006, Spain antonio.pastorperales@telefonica.com 3 Hewlett-Packard Laboratories, Long Down Avenue, Bristol, BS34 8QZ, United Kingdom adrian.shaw@hp.com 1. Introduction Abstract: Users currently experience different levels of protection when accessing the Internet via their various personal devices and network connections, due to variable network security conditions and security applications available at each device. The SECURED project addresses these issues by designing an architecture to offload security applications from the end-user devices to a suitable trusted node in the network: the Network Edge Device (NED). Users populate a repository with their security applications and policy, which will then be fetched by the closest NED to protect the user s traffic when he connects to a network. This setting provides uniform protection, independent of the actual user device and network location (e.g. public WiFi hotspot or 3G mobile connection). In other words, a user-centric approach is fostered by this architecture, opposed to the current device- or networkbased security schema, with cost and protection benefits and simultaneously enabling new business models for service and network providers. Nowadays, most people in developed countries exploit several personal devices to access the Internet, ranging from traditional terminals, such as desktops, laptops, tablets and smartphones, to new devices such as smart TV, car infotainment systems, and more. Furthermore, this number is expected to increase in the coming years due to smart Internetof-Things and wearable devices, such as Google Glass [1]. While this scenario empowers the user with new and attractive capabilities, it also, at the same time, poses significant challenges in terms of security, particularly with respect to protection of the devices (and their users) from external threats. First, many devices have limited computational and storage resources, particularly embedded devices and mobile terminals, and are often further constrained by severe limitations in terms of power consumption. As a consequence, complex protection applications (like malware detection with a large signature database or VPN client with strong encryption) may not be easily executed on all devices, hence exposing their communications to security threats like malware infection or data interception during the network transfer. A second issue is related to the variety of network connections exploited by end-users that want the ability to connect to the Internet anywhere and anytime: home xdsl, public WiFi hotspots, company networks or 3G/4G mobile connections are some examples. However, this flexibility comes at a price: the intrinsic security level of these various connections is highly different. For example, a user is typically exposed to more threats when connecting from a public hotspot than when connecting from the corporate network as this last one usually includes a sophisticated border firewall. Copyright 2014 The Authors Page 1 of 9

2 Figure 1: moving security applications from user terminals to the network. Third, given the high variability in hardware and software platforms adopted by user devices, the same applications may not be available for all devices. For example, powerful parental control applications are normally available for desktops and laptops while the same software may not be available when browsing the Internet from other devices, such as a smartphone or a smart TV, hence leaving kids unprotected. Additionally, some devices are not promptly updated with security patches [2] or don t even have the ability to run userselected security applications, as is the case for most smart-tv sets. This boils down to different security applications being available at the various devices and variable security level of their base software. As a consequence of this overall scenario, the user is forced to buy different protection applications for his many devices (with the associated problems of cost and different configurations and capabilities) yet might not achieve uniform protection (e.g. in case the application does not exist for the given platform or the user connects from a machine that cannot be secured, such as a public kiosk): a real nightmare for security-conscious citizens. 2. Objectives This paper proposes a possible solution to the above mentioned problems, based on a network application offloading approach (Figure 1). In a nutshell, we move the security protection from the user terminal to the (closest) network edge device (NED), which can be represented by a properly enhanced access point, switch or router operating at the edge of the network. According to this approach, users will configure the desired security countermeasures (applications and policies) only once and the NEDs will have the responsibility to apply them automatically to all the network connections started by the given user, regardless of the physical terminal in use and the current network attachment point. The main advantage of this approach consists in transforming the current protection approach from network-based (or device-based) into a new user-centric paradigm, hence delivering personalized protection independent from the user s device and location. In addition, this would no longer require installing specific software on each user device, which simplifies management and, potentially, reduces power consumption, hence offering to devices with limited capabilities the same level of protection of more complex platforms. Copyright 2014 The Authors Page 2 of 9

3 Of course this approach requires a good deal of trust in the NED, which is a very critical issue given the recent public disclosure that national security agencies intercept a massive amount of personal communications. This is one of the reasons why we took particular care in defining strong technical solutions (described in the next sections) to formally guarantee high levels of trust in the NED. In any case, if the user does not trust the NED or prefers a double line of protection to implement defence-in-depth the NED can be used as a supplement to standard device- or network-based security measures. In other words, using the NED does not force the user to give up his legacy security solutions. 3. Methodology In order to fulfil our objectives, we need different logical components. First, we need to enrich the network with the capability to recognize which user is currently connecting to it. A wide range of options are available, starting with a traditional user/password authentication (maybe through a captive portal), 802.1x authentication, or even more unconventional approaches, such as facial recognition (which requires an additional software on the user terminal) that exploits the fact that most of the modern user terminals include also an integrated webcam. It is worth noting that user identity is not needed to accept or refuse the right to connect to the network (we assume that this problem is managed in a separate and standard way by the network provider). Instead, it is required to retrieve the user profile and configure the NED with the security applications/policies associated to the user itself. Of course, in case the network provider is also the NED provider then it can choose to use the same system for network access control and authentication towards the NED. The second component, the NED, is a network device that integrates network and computing capabilities and that is reconfigurable at run-time to execute the required security applications based on the users attached to it. This component represents one of the most critical pieces of the architecture and it needs to provide the proper isolation between different users (both with respect to their network traffic and computations). Additionally, the NED must be trusted as the user must be certain that the NED is really executing only the user s applications and not performing any malicious activities on the user s traffic. Finally, all the traffic between the user terminal and the NED must be protected by a secure channel, so that user s data cannot be read or modified by an attacker before the NED applies the required user-defined protection measures. The third component addresses the necessity to protect the Internet connection when the user attaches to a traditional network, which does not have the network application offloading capabilities. This requires installing a small monitoring application on the user terminal that is activated each time the device attaches to a new network and checks that the connection is made to a trusted and secure NED. In case this condition is not verified, the above mentioned application will establish a remote connection (e.g. VPN) to a trusted NED and redirect all the traffic of the user terminal to the remote network node, hence guaranteeing the expected level of protection although with a higher latency. 4. Technology Description The resulting architecture exploits several cutting-edge technologies. First, to meet the trust requirement, NEDs are equipped with the Trusted Platform Module (TPM) cryptographic chip [3], which when coupled with appropriate management software, for example TrouSerS [4] permits to securely measure the software state of the platform and to report it along with the platform identity. This enables users to determine if the device they are attached to is a NED (i.e. is part of the secure infrastructure) and then use remote attestation techniques [5, 6] to verify that the software Copyright 2014 The Authors Page 3 of 9

4 executed at the NED is that expected by the user and no tampering occurred both in the NED operating system software and the user s applications. This guarantees to the user that the network operator is not performing malicious or unwanted actions on his traffic. As a NED will process at the same time the traffic of several users, strict isolation is important, both with respect to traffic and computations, and can be provided with several technologies. SDN (Software Defined Networking) techniques, such as OpenFlow [7], hold the promise to split the network in different partitions, each one assigned to a specific user, and to confine the traffic of each user in his own slice. This ensures that user s packets will always be processed by a NED before they reach other users. From the computing point of view, we need a distinct execution container for each user, to allow multiple users to run their applications on the same NED in an independent and isolated way. In this respect, various options are available that provide different trade-offs between isolation, generality and overhead. Dedicated or language-specific Virtual Machines (e.g., Java VMs) are light but would require a major rewriting of the applications and may not offer adequate protection, such as memory and CPU isolation between users. Other technologies such as Docker ( or Linux Containers ( are more general, still lighter than general virtual machines but are not completely isolated. Full-fledged virtual machines (such as those run by standard hypervisors, e.g. KVM, VMware and Xen) provide the strongest isolation and compatibility with legacy applications, but they introduce a notable overhead particularly in terms of CPU and memory consumption, which prevents to consolidate the applications of a massive number of users on a few NEDs. Whatever is the execution container chosen for network application offloading, this schema is compatible with the service model proposed in ETSI by the Network Functions Virtualisation (NFV) group which supports implementing network functions in software that can run on a range of industry standard server hardware, and that can be moved to, or instantiated in, various locations in the network as required, without the need to install new equipment [8]. In addition, the adoption of industry standard components, such as OpenFlow (for the networking portion) and KVM (for the computation part), enables our solution to be integrated in cloud-oriented platforms (e.g. OpenStack), hence guaranteeing synergies between different services of a network operator, which could exploit the same infrastructure to provide cloud, networking and security services. Moreover, this allows a NED to easily delegate part of its workload to other machines, such as servers operating in a (remote) datacentre, which can guarantee almost unlimited computational power in addition to cost savings. Since our approach is user-centric, we are also considering the problem to configure in a simple way the security applications, as the average user will not be an expert in network or system management. To this aim, we are also designing a high-level policy language to express generic protection requirements suitable for the general user. Example are block all malware, do not permit access to phishing sites and block all content inappropriate for children 7-years old. In turn, the policy expressed with this language will be automatically translated to the actual configurations of the user-selected security applications, thus relieving users from the problem of understanding the nitty-gritty details of security configurations. Furthermore, this would permit network operators to select the security applications that are most appropriate for their infrastructure, while still providing the requested level of security to their users. An additional benefit of a policy-based security configuration is the possibility to apply more than one policy to the same network connection. For example, a parent when buying a smartphone for his child could sign a contract requiring that the connection to the Internet is Copyright 2014 The Authors Page 4 of 9

5 always subject to the policies set by himself, with higher priority, in addition to the policies set by his child. In a similar way, connections of employees in a BYOD environment would be subject to the employer s policies in addition to the ones set by the employee himself. Arbitrary composition of policies, with the proper level of priority is one of the characteristics supported from day zero, with a schema that is hierarchical and general: for example all connections could also always be subject to the policy of the network operator, with the highest priority. The NED would enforce all the policies in the correct order and inform the end-user about the final global policy applied to his network connection. 5. Developments Figure 2: logical architecture for offloading security applications into the network. Figure 2 shows the generic logical architecture that we designed to offload security applications to the NED. When it comes to implementation, we foresee the development of two main flavours of the NED: the monolithic and the split ones. The monolithic NED is a self-contained box which performs all the functions needed by our model. It intercepts the user traffic, performs user authentication, connects to a repository for retrieving the user s security policy and applications, executes the applications locally and finally provides feedback to the user about correct processing of his network traffic. This model is suitable for small environments, with a low number of users (as the computational capacity is limited): typically a home gateway (to protect all the various devices of the family and the occasional visitors) or an edge router for a small or medium enterprise (depending on the number of simultaneously active users). On the other hand, the split NED is designed to use two different logical components: the network front-end and the computational back-end. The first one intercepts the user traffic, performs user authentication, and connects to a repository for retrieving the user s security policy and applications. However, these applications are not executed locally (due to limited computational capacity or high number of simultaneous users), rather suitable computational nodes (such as those of a cloud computing system) are selected for execution of the user s applications. This model is suitable for large environments such as corporate networks (that would probably use a private cloud for the computational part) or mobile network operators (that could integrate the computational part in their NFV platform). Copyright 2014 The Authors Page 5 of 9

6 market description potential expected potential users pricing market value Customers (families) interested in a parental 1,383, /year 41.5 M control software Customers interested in personal security 18,281, /year M software (e.g. personal firewall) Corporate mobile users interested in mobile 787, /year 39.4 M protection software Corporate users that adopt the BYOD 2,412, /year M paradigm, interested in mobile protection software Companies interested in operator-based 52, /year 52.4 M protection software (e.g. corporate firewalls) total M Table 1: possible yearly revenues for an Italian telecom operator from new in-network security services 6. Business Benefits The proposed architecture has several potential benefits for various categories: end-users, network operators, service providers and application developers. 6.1 Benefits for stakeholders End-users will have the option to reduce their costs for protection by buying a single application and using it to protect all their devices, rather than buying a different application for each device. Additionally, by specifying a high-level policy (automatically translated to the configuration for a specific application), the users will be able to migrate from one application to another without the hassle of learning the different configuration options, while at the same time offering to the network operator the freedom to choose the best set of security applications for its infrastructure. Last but not least, high-level policies are also ideally suited to create standard policy sets that can be provided to the users by specific interest groups (such as parents associations or user groups) thus simplifying the spread of correct and well-thought-out security configurations. Network operators can exploit their new SDN and NFV architectures in conjunction with network offloading to reduce the time to market for new security services and to offer end-users one additional service: ubiquitous access to a NED. Of course operators providing multiple access technologies (e.g. xdsl at home and 3G/4G for mobility) in a single bundle are better positioned to offer generic access to the NED than those operators managing a single access technology; these last ones will probably need to enter into an agreement with operators handling complementary technologies. On another hand, service providers could offer a NED independently from the network operators, by placing them strategically inside the transport networks of several operators. In this way there would be a security offer independent from the network subscription. Finally, developers of security applications would have the benefit to have their applications available for any device rather than spending effort for porting them to the different software platforms. Hence they could better spend their time in improvements than in tedious porting activities. Moreover, the concept of generalized applications and generic policies would naturally support the creation of a marketplace for NED security applications, potentially increasing competition, lowering prices and creating a new business ecosystem as it happened in the past for mobile apps. Copyright 2014 The Authors Page 6 of 9

7 6.2 A quantitative evaluation of business opportunities for network operators The possibility to install security applications in the network allows telecom operators to exploit new business opportunities by selling secure ubiquitous access to their customers. For instance, a recent study [9] of the Italian market (which accounts M Internet users and 60.9 M inhabitants at December 2012) evaluates the potential customers and the corresponding market value originated by five possible types of security services. The results (summarized in Table 1) show that those services alone have a potential market value for the telecom operators of more than 500 M per year, on a global market for telecom services estimated at about 60 billion /year. The personal opinion of the authors is that these numbers can be easily reached if a strong marketing campaign will be carried out, focusing on the possible service (e.g. Your kids will be always protected wherever they go and whatever they use to connect to the Internet ) instead of the underlying technology which, for most of the people, is an unnecessary detail. In this respect, the most critical aspect from the business perspective is the availability of easy to use (yet powerful) applications that allow experiencing the new service. Although this preliminary quantitative analysis does not take into account the cost of delivering the service, nor the difficulties to turn the potential value into actual revenues (i.e. convincing the potential customers to buy the new services), it shows that the possibility to deliver ubiquitous in-network security services can offer to the telecom provider interesting business opportunities. 6.3 Efficiency enhancements for network operators Security application offloading can offer relevant efficiency enhancements to network operators. These enhancements can be directly translated into several cost reductions at different points. First of all, network operators can migrate from heterogeneous security appliances, usually requiring specific management mechanisms for each device (e.g. a Firewall appliance or Security Network monitoring console), to a unique normalized device supporting a unified remote management (the NED and its interfaces). Another relevant cost reduction is associated to service configuration, the management of incidents to resolve and the continuous updates and security patches that any security network tool requires. These entire tasks can be managed in the NED as a network-centric model and integrated into the management flows network operators apply to provision and control their network infrastructure, opposed to manage devices at client premises, which usually implies limited remote access or physical displacement. Finally the Split NED model will provide the very same benefits that NFV promise in general, such as the growth of on-demand availability or the extensive use of generalpurpose hardware. 7. Market strategies Each stakeholder has different ways to benefit from the security offloading model proposed in this paper. Developers potentially interested in this model range from freelancers or open-source based companies up to high-level security software enterprises. The first ones could start with small security applications, based on legacy or open-source code, with revenues coming from different models, such as dual-licenses or professional services. Some could even evolve to new disruptive security services easily to deploy based on this model. Big players could focus in creating or migrating carrier-grade or high-end professional security Copyright 2014 The Authors Page 7 of 9

8 software oriented to Virtualised Network Function (VNF) [10] that will also take advantage of SECURED benefits with an easy adaptation to potential mass market. Hardware vendors are an additional kind of stakeholder that could join this model. As SDN and NFV deployments increase within different businesses due to the use of costeffective commodity servers and industry standard software, there is also a growing need for standardised and open networking hardware to support such modern converged infrastructures. These converged infrastructures would combine all the networking, compute and storage into a seamless and highly configurable entity, which would in turn support the configurability and security requirements needed by NEDs and application offload. Furthermore, there are potential opportunities for software developers that compete in hardware market with security appliances. Business case could emerge for NED implementation as home gateway or enterprise UTM (Unified Threat Management) appliance that include the NED in hardware and a marketplace with different security appliances to compete in the security market. Service providers and mainly network operators can exploit the user-centric approach described above to create business opportunities around user security needs, in contrast with network-centric classic models that offer network security applications that oversize the needs of users offering complex security devices. In this respect, two alternative strategies can be foreseen: the on-premise and network models. The on-premise model implies to include the monolithic NED capacity in the network device. It may be a success strategy for medium-sized service providers or network operators with an internal process for distributing their own CPEs (Customer Premises Equipment), allowing them to integrate the NED as part of the home gateway. For SME clients a network operator can rent or sell dedicated NED-enabled devices, where security services are usually provided within the security device (firewall or network device). This approach can reduce the portfolio of physical security devices, while keeping the service portfolio allowing cost reduction per device. The second alternative, the network model, will focus the NED deployment on the network infrastructure itself. This is the natural model for those having their own network infrastructure or wherever on-premise options are not feasible (mobile network operators). We propose a possible strategy to be followed by a network operator defined in progressive steps. As a first step, start with legacy network access devices (BRAS, PGW [11], etc.) that allow redirecting traffic to NED devices to save in equipment and to avoid disruptions, while in parallel new equipment acquisitions will include the NED platform In a second step, the operator would go through a progressive migration of legacy security services, like parental control or managed security, adding new clients to the NED platform and offering the same or even improved services to stimulate wider interest and accelerate migrations. Finally the last step on this trip will bring the growth in capacity based on the NFV model, with an infrastructure based on a dedicated cloud with COTS servers and cloud management and orchestrations systems fully integrated with network operator and service provider internal processes: Technical validation, integration with OSS/BSS environments, end user public portals, etc. 8. Conclusions We have described in this paper motivation, architecture and technologies to support executing security applications into a trusted and secure network node rather than at an enduser device. This research is part of the SECURED project ( co-funded by the European Commission under the ICT theme of FP7 (grant agreement no ). This project has currently designed the architecture and developed the base components, and will deliver a first prototype on October 2014, to demonstrate the Copyright 2014 The Authors Page 8 of 9

9 feasibility of the proposed approach, while a set of more mature components will be gradually released in the following years. We think that providing high protection to all personal devices independent of their capabilities and network connection is an important issue, especially given the increasing number of networked personal devices used by most people. Achieving this result with an architecture which is in-line with Future Internet evolution (SDN and NFV) is surely a bonus as it enables various business opportunities. References [1] Google Glass, [2] S-L-O-W Android Updates = Refunds and Release from Contracts?, [3] Trusted Computing Group TPM Main Specification, Level 2, Version 1.2, Revision 116, 2011, [4] TrouSerS - The open-source TCG Software Stack, [5] R. Sailer, X. Zhang, T. Jaeger, L. van Doorn, Design and Implementation of a TCG-based Integrity Measurement Architecture, 13th USENIX Security Symposium, San Diego (CA, USA), 2004 [6] F. Armknecht, Y. Gasmi, A.-R. Sadeghi, P. Stewin, M. Unger, G. Ramunno, D. Vernizzi, An Efficient Implementation of Trusted Channels Based on OpenSSL, 3rd ACM Workshop on Scalable Trusted Computing, Alexandria, (VA, USA), 2008 [7] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, J. Turner, OpenFlow: enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review, 38(2), March 2008 [8] ETSI, Network Functions Virtualisation, [9] F. Risso, A. Manzalini, M. Nemirovsky, Some Controversial Opinions on Software-Defined Dataplane Services, 1st Workshop on Software Defined Networks for Future Networks and Services (SDN4FNS), Trento (Italy), November 2013 [10] ETSI GS NFV 003, Network Functions Virtualisation (NFV); Terminology for Main Concepts in NFV, [11] 3GPP TS , Network Architecture, Copyright 2014 The Authors Page 9 of 9

Security for all: network-based protection for personal devices

Security for all: network-based protection for personal devices Security for all: network-based protection for personal devices Antonio Lioy Politecnico di Torino < lioy @ polito.it > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015 Why SECURity at

More information

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING

Conference. Smart Future Networks THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF EVERYTHING Conference THE NEXT EVOLUTION OF THE INTERNET FROM INTERNET OF THINGS TO INTERNET OF Smart Future Networks www.internet-of-things.no EVERYTHING Patrick Waldemar Vice President Telenor Research and Future

More information

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services

The promise of SDN. EU Future Internet Assembly March 18, 2014. Yanick Pouffary Chief Technologist HP Network Services The promise of SDN EU Future Internet Assembly March 18, 2014 Yanick Pouffary Chief Technologist HP Network Services Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform

Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Evolution of OpenCache: an OpenSource Virtual Content Distribution Network (vcdn) Platform Daniel King d.king@lancaster.ac.uk Matthew Broadbent m.broadbent@lancaster.ac.uk David Hutchison d.hutchison@lancaster.ac.uk

More information

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE

FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE FROM A RIGID ECOSYSTEM TO A LOGICAL AND FLEXIBLE ENTITY: THE SOFTWARE- DEFINED DATA CENTRE The demand for cloud infrastructure is rapidly increasing, the world of information is becoming application and

More information

Bootstrapping "softwarised" infrastructure trust: from SDN towards NFV

Bootstrapping softwarised infrastructure trust: from SDN towards NFV Bootstrapping "softwarised" infrastructure trust: from towards NFV Ludovic Jacquin Hewlett-Packard Laboratories < ludovic.jacquin@hp.com > Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28/4/2015

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud

Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Solution Brief Artesyn Embedded Technologies* Telecom Solutions Intel Xeon Processors Different NFV/SDN Solutions for Telecoms and Enterprise Cloud Networking solutions from Artesyn Embedded Technologies*

More information

SA Series SSL VPN Virtual Appliances

SA Series SSL VPN Virtual Appliances SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by

More information

Why Service Providers Need an NFV Platform Strategic White Paper

Why Service Providers Need an NFV Platform Strategic White Paper Why Service Providers Need an NFV Platform Strategic White Paper Network Functions Virtualization (NFV) brings proven cloud computing and IT technologies into the networking domain to help service providers

More information

Network functions Virtualisation CIO Summit 2013. Peter Willis & Andy Reid

Network functions Virtualisation CIO Summit 2013. Peter Willis & Andy Reid Network functions Virtualisation CIO Summit 2013 Peter Willis & Andy Reid Contents 2 1. What is Network functions Virtualisation (NfV) 2. Strategic Networking Paradigms & Software Defined Networks 3. 2011-2012

More information

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking

More information

OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization.

OpenFlow, Network Function Virtualisation, Virtualised Network Function, Network Virtualisation, IEEE 802.1X, Authentication and Authorization. Deploying a virtual network function over a software defined network infrastructure: experiences deploying an access control VNF in the University of Basque Country s OpenFlow enabled facility Eduardo

More information

Network Functions Virtualization (NFV) for Next Generation Networks (NGN)

Network Functions Virtualization (NFV) for Next Generation Networks (NGN) P a g e 1 Network Functions Virtualization (NFV) for Next Generation Networks (NGN) Summary Network Functions Virtualization (NFV) has drawn industry attention. Network Virtualization aims to transform

More information

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding www.citrix.com Contents Introduction... 3 The On- boarding Problem Defined... 3 Considerations for Application On- boarding...

More information

Topics: Cloud middleware, Datacentre services, Cloud model evolution and Cloud service market orientation

Topics: Cloud middleware, Datacentre services, Cloud model evolution and Cloud service market orientation Recommendations for the Workprogramme H2020-ICT-2018-2019 Topics: Cloud middleware, Datacentre services, Cloud model evolution and Cloud service market orientation Editor: Dana Petcu, West University of

More information

Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe

Network Functions as-a-service over Virtualised Infrastructures T-NOVA. Presenter: Dr. Mamadu Sidibe Network Functions as-a-service over Virtualised Infrastructures T-NOVA Presenter: Dr. Mamadu Sidibe Presentation Outline Brief introduction to NFV T-NOVA Facts T-NOVA Consortium T-NOVA Vision T-NOVA objectives

More information

DOBUS And SBL Cloud Services Brochure

DOBUS And SBL Cloud Services Brochure 01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure enquiries@softbox.co.uk DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted

More information

SECURALIVE WEB SECURITY GATEWAY

SECURALIVE WEB SECURITY GATEWAY SECURALIVE WEB SECURITY GATEWAY allows you to filter users DNS queries using filtering categories and black and white lists of forbidden hosts. On access to a particular site being denied through DNS filtering,

More information

SDN and NFV in the WAN

SDN and NFV in the WAN WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network

More information

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project

In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project In-Network Programmability for Next-Generation personal Cloud service support: The INPUT project Constantinos Vassilakis, PhD Athens, 2/10/2015 Motivation Trend Move functionality and services to the cloud

More information

End-to-End Secure Cloud Services. Pertino Perspective

End-to-End Secure Cloud Services. Pertino Perspective Pertino Perspective Table of Contents Executive summary...2 Cloud computing: A brief history...2 Latest technology and best practices... 2 Technical expertise... 2 The Pertino solution...3 innovative security...

More information

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed

More information

SDN. What's Software Defined Networking? Angelo Capossele

SDN. What's Software Defined Networking? Angelo Capossele SDN What's Software Defined Networking? Angelo Capossele Outline Introduction to SDN OpenFlow Network Functions Virtualization Some examples Opportunities Research problems Security Case study: LTE (Mini)Tutorial

More information

Sistemi Operativi e Reti. Cloud Computing

Sistemi Operativi e Reti. Cloud Computing 1 Sistemi Operativi e Reti Cloud Computing Facoltà di Scienze Matematiche Fisiche e Naturali Corso di Laurea Magistrale in Informatica Osvaldo Gervasi ogervasi@computer.org 2 Introduction Technologies

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 admin@trustedcomputinggroup.org

More information

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology

I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology I/O Virtualization Using Mellanox InfiniBand And Channel I/O Virtualization (CIOV) Technology Reduce I/O cost and power by 40 50% Reduce I/O real estate needs in blade servers through consolidation Maintain

More information

SDN, a New Definition of Next-Generation Campus Network

SDN, a New Definition of Next-Generation Campus Network SDN, a New Definition of Next-Generation Campus Network Contents Campus Evolution and Development Trends... 1 Three Changes to Drive the Campus Network Development... 2 Fundamental Changes in User Behaviors...2

More information

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments

Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments Cisco Unified Network Services: Overcome Obstacles to Cloud-Ready Deployments What You Will Learn Deploying network services in virtual data centers is extremely challenging. Traditionally, such Layer

More information

PULSE SECURE FOR GOOGLE ANDROID

PULSE SECURE FOR GOOGLE ANDROID DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device

More information

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges

More information

Successfully Deploying Globalized Applications Requires Application Delivery Controllers

Successfully Deploying Globalized Applications Requires Application Delivery Controllers SHARE THIS WHITEPAPER Successfully Deploying Globalized Applications Requires Application Delivery Controllers Whitepaper Table of Contents Abstract... 3 Virtualization imposes new challenges on mission

More information

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

ARCHITECT S GUIDE: Mobile Security Using TNC Technology ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 admin@trustedcomputinggroup.org www.trustedcomputinggroup.org

More information

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY

ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY ADVANCED SECURITY MECHANISMS TO PROTECT ASSETS AND NETWORKS: SOFTWARE-DEFINED SECURITY One of the largest concerns of organisations is how to implement and introduce advanced security mechanisms to protect

More information

Readiness Assessments: Vital to Secure Mobility

Readiness Assessments: Vital to Secure Mobility White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats

More information

End-to-end Secure Cloud Services a Pertino whitepaper

End-to-end Secure Cloud Services a Pertino whitepaper a Pertino whitepaper Executive summary Whether companies use the cloud as a conduit to connect remote locations and mobile users or use cloud-based applications, corporations have found that they can reduce

More information

Virtual Machine in Data Center Switches Huawei Virtual System

Virtual Machine in Data Center Switches Huawei Virtual System Virtual Machine in Data Center Switches Huawei Virtual System Contents 1 Introduction... 3 2 VS: From the Aspect of Virtualization Technology... 3 3 VS: From the Aspect of Market Driving... 4 4 VS: From

More information

Infrastructure Virtualization for Hybrid Cloud

Infrastructure Virtualization for Hybrid Cloud Infrastructure Virtualization for Hybrid Cloud Technology Transformation Public cloud has delivered elastic computing to enterprises by offering on-demand resources to accommodate the burst computing needs.

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK SOFTWARE DEFINED NETWORKING A NEW ARCHETYPE PARNAL P. PAWADE 1, ANIKET A. KATHALKAR

More information

The Role of Virtual Routers In Carrier Networks

The Role of Virtual Routers In Carrier Networks The Role of Virtual Routers In Carrier Networks Sterling d Perrin Senior Analyst, Heavy Reading Agenda Definitions of SDN and NFV Benefits of SDN and NFV Challenges and Inhibitors Some Use Cases Some Industry

More information

Relational Databases in the Cloud

Relational Databases in the Cloud Contact Information: February 2011 zimory scale White Paper Relational Databases in the Cloud Target audience CIO/CTOs/Architects with medium to large IT installations looking to reduce IT costs by creating

More information

1 COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED.

1 COPYRIGHT 2013 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Welcome to this overview about Software-Defined Networking, or SDN, and Network Virtualization. This training course will not only provide the technical background to SDN, but will also show the value

More information

white paper Introduction to Cloud Computing The Future of Service Provider Networks

white paper Introduction to Cloud Computing The Future of Service Provider Networks white paper Introduction to Cloud Computing The service provider industry is in the midst of a major inflection point as networks move away from vertically integrated architectures that bundle proprietary

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R O r a c l e V i r t u a l N e t w o r k i n g D e l i v e r i n g F a b r i c

More information

PLUMgrid Open Networking Suite Service Insertion Architecture

PLUMgrid Open Networking Suite Service Insertion Architecture White Paper PLUMgrid Open Networking Suite Service Insertion Architecture Introduction A rapid increase in the use of cloud services across the globe require networks to be adaptable and flexible. PLUMgrid

More information

AN OPEN PLATFORM TO ACCELERATE NFV. A Linux Foundation Collaborative Project

AN OPEN PLATFORM TO ACCELERATE NFV. A Linux Foundation Collaborative Project AN OPEN PLATFORM TO ACCELERATE NFV A Linux Foundation Collaborative Project TABLE OF CONTENTS Executive Summary...3 Contributing Organizations and Authors...4 Introducing OPNFV...5 The Benefits of OPNFV...6

More information

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013

SDN Security Considerations in the Data Center. ONF Solution Brief October 8, 2013 SDN Security Considerations in the Data Center ONF Solution Brief October 8, 2013 Table of Contents 2 Executive Summary 3 SDN Overview 4 Network Security Challenges 6 The Implications of SDN on Network

More information

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST

A Cloud WHERE PHYSICAL ARE TOGETHER AT LAST A Cloud WHERE PHYSICAL AND VIRTUAL STORAGE ARE TOGETHER AT LAST Not all Cloud solutions are the same so how do you know which one is right for your business now and in the future? NTT Communications ICT

More information

White Paper. Innovate Telecom Services with NFV and SDN

White Paper. Innovate Telecom Services with NFV and SDN White Paper Innovate Telecom Services with NFV and SDN 2 NEXCOM White Paper As telecommunications companies seek to expand beyond telecommunications services to data services, they find their purposebuilt

More information

Business Case for Virtual Managed Services

Business Case for Virtual Managed Services Business Case for Virtual Managed Services Executive Summary Managed services allow businesses to offload day-to-day network management tasks to service providers and thus free up internal talent to focus

More information

Business Case for Open Data Center Architecture in Enterprise Private Cloud

Business Case for Open Data Center Architecture in Enterprise Private Cloud Business Case for Open Data Center Architecture in Enterprise Private Cloud Executive Summary Enterprise IT organizations that align themselves with their enterprise s overall goals help the organization

More information

Software Defined Environments

Software Defined Environments November 2015 Software Defined Environments 2015 Cloud Lecture, University of Stuttgart Jochen Breh, Director Architecture & Consulting Cognizant Global Technology Office Agenda Introduction New Requirements

More information

Definition of a White Box. Benefits of White Boxes

Definition of a White Box. Benefits of White Boxes Smart Network Processing for White Boxes Sandeep Shah Director, Systems Architecture EZchip Technologies sandeep@ezchip.com Linley Carrier Conference June 10-11, 2014 Santa Clara, CA 1 EZchip Overview

More information

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

BEYOND LIMITATIONS CONNECTING POSSIBILITIES BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in

More information

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software

Mobile Device Management in the Systems Management Ecosystem. Katie Wiederholt, Dell Software Mobile Device Management in the Systems Management Ecosystem Katie Wiederholt, The forces driving change in mobility Agenda The journey to MDM Where do we want to be and mobile security technologies 2

More information

Ubuntu OpenStack on VMware vsphere: A reference architecture for deploying OpenStack while limiting changes to existing infrastructure

Ubuntu OpenStack on VMware vsphere: A reference architecture for deploying OpenStack while limiting changes to existing infrastructure TECHNICAL WHITE PAPER Ubuntu OpenStack on VMware vsphere: A reference architecture for deploying OpenStack while limiting changes to existing infrastructure A collaboration between Canonical and VMware

More information

Application Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.

Application Defined E2E Security for Network Slices. Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica. Application Defined E2E Security for Network Slices Linda Dunbar (Linda.Dunbar@huawei.com) Diego Lopez (diego.r.lopez@telefonica.com ) Into the Inter-connected World Internet Mobile Internet Internet of

More information

Network functions virtualization and software management

Network functions virtualization and software management ericsson White paper Uen 284 23-3248 December 2014 Network functions virtualization and software management LEVERAGING THE FULL POTENTIAL WITH NETWORK SLICING Network Functions Virtualization technology

More information

Simplifying IT with SDN & Virtual Application Networks

Simplifying IT with SDN & Virtual Application Networks Simplifying IT with SDN & Virtual Application Networks Justin Chiah Product Category Head HP Networking APJ Solutions for the New Style of IT Networking innovations lay the foundation for transformation

More information

Citrix On-Boarding A target Cloud

Citrix On-Boarding A target Cloud Uni On-Board An Introduction to Uni Systems Cloud On-boarding services portfolio White Paper Solution Brief Contents Introduction... 3 The On-Boarding problem Defined... 3 Defining an application workload...

More information

HyperQ Storage Tiering White Paper

HyperQ Storage Tiering White Paper HyperQ Storage Tiering White Paper An Easy Way to Deal with Data Growth Parsec Labs, LLC. 7101 Northland Circle North, Suite 105 Brooklyn Park, MN 55428 USA 1-763-219-8811 www.parseclabs.com info@parseclabs.com

More information

SOFTWARE DEFINED NETWORKING

SOFTWARE DEFINED NETWORKING SOFTWARE DEFINED NETWORKING Bringing Networks to the Cloud Brendan Hayes DIRECTOR, SDN MARKETING AGENDA Market trends and Juniper s SDN strategy Network virtualization evolution Juniper s SDN technology

More information

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the

More information

Customer Benefits Through Automation with SDN and NFV

Customer Benefits Through Automation with SDN and NFV Customer Benefits Through Automation with SDN and NFV Helping service providers solve specific challenges they are facing today while improving the overall customer service life cycle 1 Table of Contents

More information

Network Operations in the Era of NFV & SDN. Chris Bilton - Director of Research & Technology, BT

Network Operations in the Era of NFV & SDN. Chris Bilton - Director of Research & Technology, BT Network Operations in the Era of NFV & SDN Chris Bilton - Director of Research & Technology, BT Agenda 1 2 3 4 Introduction Overview of NfV & SDN The Challenge Today s Carrier operations Contrasting Carrier

More information

Securing Virtual Applications and Servers

Securing Virtual Applications and Servers White Paper Securing Virtual Applications and Servers Overview Security concerns are the most often cited obstacle to application virtualization and adoption of cloud-computing models. Merely replicating

More information

Understanding the Business Case of Network Function Virtualization

Understanding the Business Case of Network Function Virtualization White paper Understanding the Business Case of Network Function Virtualization Part I of the series discusses the telecom market scenario in general, market and business drivers behind push for a building

More information

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments

NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Solution Brief Telefonica NFV Reference Platform Intel Xeon Processors NFV Reference Platform in Telefónica: Bringing Lab Experience to Real Deployments Summary This paper reviews Telefónica s vision and

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Branches as Nimble as the Cloud: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY

Branches as Nimble as the Cloud: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY Branches as Nimble as the Cloud: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY The principles of cloud computing are transforming the delivery of information services

More information

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION?

CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? CARRIER LANDSCAPE FOR SDN NEXT LEVEL OF TELCO INDUSTRILIZATION? Andreas Gladisch, Fritz-Joachim Westphal Deutsche Telekom Innovation Labs COMPLEXITY BY DOZENS OF SPECIALIZED BOXES AND THOUSANDS OF PROTOCOLS.

More information

Software Defined Security Mechanisms for Critical Infrastructure Management

Software Defined Security Mechanisms for Critical Infrastructure Management Software Defined Security Mechanisms for Critical Infrastructure Management SESSION: CRITICAL INFRASTRUCTURE PROTECTION Dr. Anastasios Zafeiropoulos, Senior R&D Architect, Contact: azafeiropoulos@ubitech.eu

More information

Bringing the Cloud to the Enterprise Branch and WAN: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY

Bringing the Cloud to the Enterprise Branch and WAN: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY Bringing the Cloud to the Enterprise Branch and WAN: Unleashing Agility with Nuage Networks Virtualized Network Services EXECUTIVE SUMMARY The principles of cloud computing are transforming the information

More information

Network Virtualization Solutions - A Practical Solution

Network Virtualization Solutions - A Practical Solution SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security

More information

White Paper on NETWORK VIRTUALIZATION

White Paper on NETWORK VIRTUALIZATION White Paper on NETWORK VIRTUALIZATION INDEX 1. Introduction 2. Key features of Network Virtualization 3. Benefits of Network Virtualization 4. Architecture of Network Virtualization 5. Implementation Examples

More information

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary

More information

Network Virtualization

Network Virtualization Network Virtualization What is Network Virtualization? Abstraction of the physical network Support for multiple logical networks running on a common shared physical substrate A container of network services

More information

The Evolution of the Enterprise And Enterprise Security

The Evolution of the Enterprise And Enterprise Security The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and

More information

Platform Technology to Support Network Functions Virtualization Solution

Platform Technology to Support Network Functions Virtualization Solution Platform Technology to Support Network Functions Virtualization Solution Shoji Temma Hiroaki Tanaka Masataka Sakata The concept of network functions virtualization (NFV), introduced at SDN & OpenFlow World

More information

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an

More information

Building a Converged Infrastructure with Self-Service Automation

Building a Converged Infrastructure with Self-Service Automation Building a Converged Infrastructure with Self-Service Automation Private, Community, and Enterprise Cloud Scenarios Prepared for: 2012 Neovise, LLC. All Rights Reserved. Case Study Report Introduction:

More information

Advantages of Managed Security Services

Advantages of Managed Security Services Advantages of Managed Security Services Cloud services via MPLS networks for high security at low cost Get Started Now: 877.611.6342 to learn more. www.megapath.com Executive Summary Protecting Your Network

More information

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER

SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER SINGLE-TOUCH ORCHESTRATION FOR PROVISIONING, END-TO-END VISIBILITY AND MORE CONTROL IN THE DATA CENTER JOINT SDN SOLUTION BY ALCATEL-LUCENT ENTERPRISE AND NEC APPLICATION NOTE EXECUTIVE SUMMARY Server

More information

journey to a hybrid cloud

journey to a hybrid cloud journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience

More information

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security White Paper Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security Introduction Organizations that want to harness the power of the web must deal with

More information

Leveraging SDN and NFV in the WAN

Leveraging SDN and NFV in the WAN Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined

More information

Citrix desktop virtualization and Microsoft System Center 2012: better together

Citrix desktop virtualization and Microsoft System Center 2012: better together Citrix desktop virtualization and Microsoft System Center 2012: better together 2 Delivery of applications and data to users is an integral part of IT services today. But delivery can t happen without

More information

The Promise and the Reality of a Software Defined Data Center

The Promise and the Reality of a Software Defined Data Center The Promise and the Reality of a Software Defined Data Center Authored by Sponsored by Introduction The traditional IT operational model is highly manual and very hardware centric. As a result, IT infrastructure

More information

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge

The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge White Paper The Distributed Cloud: Automating, Scaling, Securing & Orchestrating the Edge Prepared by Jim Hodges Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.juniper.net October

More information

Secure Virtualization in the Federal Government

Secure Virtualization in the Federal Government White Paper Secure Virtualization in the Federal Government Achieve efficiency while managing risk Table of Contents Ready, Fire, Aim? 3 McAfee Solutions for Virtualization 4 Securing virtual servers in

More information

Pervasive Security Enabled by Next Generation Monitoring Fabric

Pervasive Security Enabled by Next Generation Monitoring Fabric Pervasive Security Enabled by Next Generation Monitoring Fabric By: Lee Doyle, Principal Analyst at Doyle Research Sponsored by Big Switch Networks Executive Summary Enterprise networks have become ever

More information

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS

INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS INTRODUCTION TO CLOUD COMPUTING CEN483 PARALLEL AND DISTRIBUTED SYSTEMS CLOUD COMPUTING Cloud computing is a model for enabling convenient, ondemand network access to a shared pool of configurable computing

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks

A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and

More information

WhitePaper. Private Cloud Computing Essentials

WhitePaper. Private Cloud Computing Essentials Private Cloud Computing Essentials The 2X Private Cloud Computing Essentials This white paper contains a brief guide to Private Cloud Computing. Contents Introduction.... 3 About Private Cloud Computing....

More information

The New IP Networks: Time to Move From PoC to Revenue

The New IP Networks: Time to Move From PoC to Revenue White Paper The New IP Networks: Time to Move From PoC to Revenue Prepared by Roz Roseboro Senior Analyst, Heavy Reading www.heavyreading.com on behalf of www.brocade.com February 2015 Introduction The

More information

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper with Cloud-Based Security Services > White Paper It s a phenomenon and a fact: employees are always on today. They connect to the network whenever they want, from wherever they happen to be, with laptops,

More information

Lecture 02a Cloud Computing I

Lecture 02a Cloud Computing I Mobile Cloud Computing Lecture 02a Cloud Computing I 吳 秀 陽 Shiow-yang Wu What is Cloud Computing? Computing with cloud? Mobile Cloud Computing Cloud Computing I 2 Note 1 What is Cloud Computing? Walking

More information

Continuous Research Service. NFV for Carrier WiFi Brings in a Managed WiFi Service Revolution May 19, 2014

Continuous Research Service. NFV for Carrier WiFi Brings in a Managed WiFi Service Revolution May 19, 2014 Continuous Research Service NFV for Carrier WiFi Brings in a Managed WiFi Service Revolution May 19, 2014 The concept of virtualizing network services decouples applications from the underlying network

More information

Service Automation Made Easy

Service Automation Made Easy Service Automation Made Easy Networks that know how to customize the network experience for every subscriber Challenge Service providers want to quickly develop and deliver personalized services their

More information